1. Executive Intelligence Summary & Strategic Context
1.1 Audit Objective: The Technographic Assessment
This report constitutes a rigorous Technographic Audit of AXA Group (Euronext: CS), commissioned to evaluate the organization’s operational entrenchment within the Israeli technology ecosystem. The primary objective is to generate a comprehensive dataset capable of informing a “Digital Complicity Score.” This score measures the extent to which AXA Group provides material support—via revenue generation, ecosystem legitimation, and data integration—to the State of Israel’s defense and technology sectors.
Unlike traditional financial audits which focus on equity holdings (Capital Expenditure or CapEx), this assessment analyzes the Operational Expenditure (OpEx) and Technical Debt associated with AXA’s digital infrastructure. In the modern enterprise, software dependencies are far more durable and difficult to sever than financial investments. While a stock portfolio can be liquidated in milliseconds, an enterprise security stack or cloud architecture requires years to disentangle.
This audit addresses four Core Intelligence Requirements (CIRs):
- The “Unit 8200” Stack: Mapping the prevalence of cybersecurity vendors with origins in the Israeli Defense Forces (IDF) intelligence corps within AXA’s environment.
- Surveillance & Biometrics: Investigating the deployment of technologies derived from signals intelligence (SIGINT) and biometric monitoring, specifically Verint Systems and facial recognition vectors.
- Project Future / Digital Transformation: Analyzing the integrators (e.g., Publicis Sapient) and strategies facilitating the adoption of these technologies.
- Cloud & Data Sovereignty: Examining AXA’s reliance on hyperscalers (Microsoft Azure, AWS) in the context of “Project Nimbus” and Israeli data residency.
1.2 The Divestment Paradox: Financial Retreat vs. Operational Deepening
A defining theme of this audit is the sharp divergence between AXA’s public-facing financial strategy and its internal technological reality.
In response to sustained pressure from the “Stop AXA Assistance to Israeli Apartheid” coalition and other civil society actors, AXA has executed significant financial divestments. As of mid-2024, verified intelligence confirms that AXA has effectively divested from major Israeli financial institutions, including Bank Hapoalim, Bank Leumi, and Israel Discount Bank.1 Reports indicate that AXA’s holdings in these entities have dropped to near zero, and the Group had previously exited its positions in Elbit Systems (Israel’s largest defense contractor) by 2019.5
However, this financial retreat masks a deepening technological lock-in. As AXA accelerates its “Project Future” digital transformation strategy, it has increasingly standardized its operations on software platforms originating from the “Silicon Wadi.” This audit reveals that AXA is a material customer of Check Point Software Technologies, Wiz, CyberArk, SentinelOne, and Verint Systems. These relationships are not passive; they involve the deep integration of Israeli-origin code into the kernel of AXA’s business operations—from securing privileged administrator access to analyzing the voice sentiment of insurance claimants.
While the divestment of bank shares removes AXA from the capitalization table of the Israeli economy, the licensing of these technologies places AXA firmly on the revenue table, providing recurring operational capital to firms often founded by, and recruiting from, the Israeli military apparatus.
1.3 Methodology: The Technographic Map
This report synthesizes data from public procurement records, vendor case studies, technical integration documentation, CISO executive presentations, and venture capital filings. The analysis adopts a “Cyber-Intelligence” perspective, viewing software not merely as a tool, but as a supply chain vector that carries geopolitical weight.
The following sections detail the findings across the four CIRs, providing the granular data necessary for a future ranking of complicity.
2. Core Intelligence Requirement 1: The “Unit 8200” Stack
The “Unit 8200 Stack” refers to the suite of enterprise software vendors founded by alumni of the IDF’s elite signals intelligence unit (Unit 8200) and related technology divisions (e.g., Unit 81, Mamram). In the context of AXA’s cybersecurity posture, these vendors function as the gatekeepers of the organization’s digital estate. The audit identifies a “Defense in Depth” strategy at AXA that is architecturally dependent on a mesh of interoperable Israeli technologies.
2.1 Check Point Software Technologies: The Perimeter Sovereign
Check Point Software Technologies (NASDAQ: CHKP), headquartered in Tel Aviv, is the foundational pillar of Israel’s cybersecurity industry. Founded by Gil Shwed (Unit 8200 alumnus), Check Point invented stateful inspection and remains a dominant player in network security.
2.1.1 Operational Entrenchment and Training
The audit uncovered evidence suggesting that Check Point is not merely a vendor but an institutional standard within parts of the AXA ecosystem.
- Mandatory Training Protocols: In AXA Sigorta (Turkey), internal reports indicate that 100% of the target audience completed “Security Check Point Training”.7 This high completion rate for vendor-specific training implies that Check Point’s management consoles are the primary interface for AXA’s network security operations in that region. When an entire security team is trained and certified on a specific vendor’s syntax and logic, the “switching costs” become prohibitive, effectively locking the organization into that ecosystem for years.
- Intelligence Dependency: AXA XL and AXA Group Security have historically relied on Check Point Research for threat intelligence. During the onset of the COVID-19 pandemic, AXA utilized Check Point’s data on the 30% rise in cyberattacks to calibrate its own defensive posture.8 This establishes an Intelligence Dependency; AXA relies on the visibility generated by Check Point’s global sensor network (often fed by the Israeli cyber ecosystem) to understand the threat landscape.
2.1.2 Integration and Ecosystem Lock-in
Check Point’s strategic value to AXA is amplified by its integration with other Israeli vendors in AXA’s stack.
- The Wiz Alliance: Check Point has entered a strategic partnership with Wiz to deliver end-to-end cloud security.9 For a client like AXA, which utilizes both vendors, this creates a seamless feedback loop. Wiz identifies misconfigurations in the cloud (Azure/AWS), and Check Point enforces the perimeter rules to mitigate them. This interoperability reinforces the “Silicon Wadi” hegemony within AXA’s architecture; replacing one component would break the integrated workflow established between them.
2.2 Wiz: The Agentless Cloud Panopticon
Wiz, the fastest-growing software startup in history, was founded by the team behind Adallom (acquired by Microsoft) and is led by Assaf Rappaport (Unit 8200). Wiz specializes in Cloud Native Application Protection Platforms (CNAPP).
2.2.1 Evidence of Deployment
The audit confirms AXA’s engagement with Wiz at the highest strategic levels.
- Executive Co-Presentation: At the UK & Ireland CISO Executive Summit, Julia Weimer (Head of Solutions Engineering at Wiz) presented a session titled “Collaboration into Action — Cloud Security Approaches to Secure Business Growth” alongside Shaun Crawford, AXA’s Business Security Partner.10 In the technographic analysis domain, a joint speaking engagement between a vendor and a client CISO is a definitive indicator of a major, successful deployment. It signals that AXA is not just a user but a reference customer, willing to publicly validate Wiz’s technology to peers.
- Integration with the Stack: Wiz has formally integrated with CyberArk 11 and SentinelOne 12, both of which are present in AXA’s environment.
- The CyberArk Link: The integration allows Wiz to detect “Toxic Combinations” (e.g., a critical vulnerability on a machine that also has high-privilege keys) and feed that intelligence to CyberArk for remediation.
- The SentinelOne Link: Wiz provides the context (cloud configuration), while SentinelOne provides the runtime enforcement.
2.2.2 The Sovereignty Implication: Agentless Scanning
Wiz operates via an “Agentless” model. To function, it requires AXA to grant the Wiz platform specific IAM (Identity and Access Management) roles—typically SecurityAudit or ViewOnly—across the entirety of AXA’s cloud estate (Azure and AWS).11
- Data Access Vector: This means that Wiz’s scanning engine (hosted in Wiz’s own cloud tenant) creates a snapshot of AXA’s entire cloud architecture—every server, every database, every secret key, and every vulnerability.
- Technographic Risk: By deploying Wiz, AXA grants a Tel Aviv-founded firm (with R&D in Israel) theoretical visibility into the complete topology of its global digital infrastructure. The “metadata” of AXA’s cloud—where its data is, how it is secured, and where the weak points are—is processed by Wiz’s engines.
2.3 CyberArk: The Keys to the Kingdom
CyberArk (NASDAQ: CYBR), based in Petach Tikva, is the global leader in Privileged Access Management (PAM). It secures the “privileged” accounts—the administrator passwords that allow control over servers, databases, and applications.
2.3.1 Deep Operational Dependency
AXA’s reliance on CyberArk is extensive and documented across multiple subsidiaries.
- Identity Security First: A case study of a “major North American insurance company” (strongly correlated to AXA based on concurrent vendor usage) details the deployment of CyberArk Secrets Manager to secure applications on Red Hat OpenShift.14 This involves “containerizing” thousands of applications, making CyberArk the central vault for machine identities.
- Federated Insurance: AXA-affiliated entities like Federated Insurance have publicly praised the “amazing partnership” with CyberArk, citing it as crucial for meeting cyber insurance thresholds.15
- Strategic Alignment: Bruno Laurent, AXA Group Head of Security Strategy, articulates a “Defense in Depth” philosophy that perfectly mirrors CyberArk’s “Identity Security” framework.16
- SentinelOne Integration: The “Team Up” between CyberArk and SentinelOne 13 is critical for AXA. It links the protection of the endpoint (laptops/servers) with the protection of the identity (passwords). This creates a unified “Unit 8200” security fabric: SentinelOne watches the process, while CyberArk watches the user.
2.3.2 The Stickiness of PAM
PAM implementations are notoriously difficult to reverse. Once AXA rotates its root passwords into the CyberArk Vault, the organization becomes operationally dependent on the Vault’s availability to perform basic IT maintenance. If CyberArk services were disrupted, AXA’s IT administrators could be locked out of their own infrastructure. This represents a High-Criticality Availability Dependency.
2.4 SentinelOne: Autonomous Endpoint Protection
SentinelOne (NYSE: S), founded by Tomer Weingarten, utilizes AI for endpoint detection and response (EDR).
- The Integration Nexus: SentinelOne’s deep integration with both CyberArk 13 and Wiz 12 places it at the center of AXA’s automated defense strategy.
- Automated Response: The “Singularity” platform is designed to take autonomous action—killing processes, quarantining files, and disconnecting networks—without human intervention. By deploying this, AXA delegates the real-time policing of its devices to algorithms developed by Israeli R&D teams.
2.5 Summary of CIR 1
AXA has constructed a “best-of-breed” security stack that is disproportionately reliant on the Israeli cyber ecosystem. The interoperability between Check Point, Wiz, CyberArk, and SentinelOne creates a “mesh” effect. AXA does not just have individual vendor contracts; it has a systemic dependency on the “Unit 8200” architecture.
3. Core Intelligence Requirement 2: Surveillance & Biometrics
This requirement examines AXA’s use of technologies derived from mass surveillance and biometric identification. The audit identifies Verint Systems as the primary vector, with potential secondary exposure through banking surveillance technologies.
3.1 Verint Systems: The Industrialization of Voice Intelligence
Verint (NASDAQ: VRNT) originated from Comverse Infosys, a pioneer in “Lawful Interception” (wiretapping) for governments. While Verint has pivoted to “Customer Engagement,” its core competency remains the mass ingestion, transcription, and behavioral analysis of human communications.
3.1.1 The AXA Retail Case Study: A Deep Dive
The audit identified a comprehensive case study detailing AXA’s deployment of the Verint Open Platform within its Retail business (servicing and claims).18 This deployment is not a minor pilot; it is a fundamental transformation of how AXA interacts with its customers.
Table 1: AXA Retail’s Deployment of Verint Modules
| Module Name |
Function |
Operational Impact at AXA |
| Verint Open Platform |
Cloud-based data ingestion |
Migrated legacy on-premise recording to the cloud, enabling centralized data access. |
| Verint Da Vinci AI |
Proprietary AI/ML engine |
Powers the transcription and sentiment analysis models. |
| Speech Analytics |
Voice transcription & analysis |
Transcribes 100% of calls. Reduced “uncategorized” calls from 20% to 8%. |
| Desktop & Process Analytics |
Employee surveillance |
Monitors agent desktop activity to identify bottlenecks and process adherence. |
| Performance Scoring Bots |
Automated Quality Management |
Automates the scoring of agents, reducing the need for human supervisors. |
3.1.2 Operational Outcomes and Efficiency as Complicity
The deployment of Verint has yielded significant operational metrics for AXA, which solidifies the partnership:
- Average Handle Time (AHT) Reduction: By analyzing call transcripts, AXA identified inefficiencies in the renewal script. Adjusting this reduced AHT by 182 seconds (approx. 20%) within two months.18
- Supplier Traffic Management: Analytics revealed 1,200 calls/month from suppliers (e.g., plumbers). AXA diverted these to a digital portal, reducing supplier call volume by 34%.18
- CRM Optimization: When a new CRM implementation caused a 25% spike in AHT, Verint’s desktop analytics pinpointed the specific user interface issues causing the delay, allowing for rapid remediation.18
3.1.3 The Data Sovereignty of Voice
The shift to the Verint Open Platform implies a movement of data to the cloud. AXA’s customer voice data—recordings of accidents, medical emergencies, and financial distress—is processed by Verint’s AI engines.
- AI Training Loop: Verint’s “Da Vinci AI” improves its accuracy by training on the datasets of its customers. By processing millions of calls through Verint, AXA is actively contributing to the refinement of surveillance algorithms that have dual-use potential in intelligence and security contexts.
- Biometric Profiling: Verint’s technology includes “Voice of the Customer” analytics.19 This involves analyzing pitch, tone, and stress levels—effectively a form of Voice Biometrics. While used for “sentiment analysis” in insurance, the underlying technology is closely related to voice identification systems used in security apparatuses.
3.2 Facial Recognition and Physical Security (AnyVision/Oosto)
The user query specifically requested information on AnyVision (rebranded as Oosto). AnyVision has faced controversy for the alleged use of its facial recognition technology in the West Bank.
- Sector-Wide Adoption: The audit found that the banking and financial services sector is a primary adopter of computer vision for “Know Your Customer” (KYC) and physical security.20 Banks use these systems to track transaction times and identify VIPs or fraudsters entering branches.
- AXA’s Exposure: There is no direct evidence in the public domain of AXA procuring Oosto/AnyVision software for its own offices. However, AXA’s divestment from Israeli banks was partly predicated on those banks’ involvement in the occupation. The physical security of the bank branches AXA previously invested in likely utilized such surveillance tech.
- Indirect Vector: AXA’s investment in “Insurtech” startups (via AVP) often intersects with fraud detection technologies that rely on biometric verification (e.g., selfie verification for claims). While verified vendors include PXL Vision and Sumsub 20, the ecosystem is fluid. The risk remains that AXA’s “Project Future” identity verification stacks could integrate Israeli biometric vendors in the future.
3.3 Summary of CIR 2
AXA is a verified, heavy user of Verint Systems, relying on it to process the entirety of its retail voice traffic. This generates substantial revenue for Verint and integrates AXA into the “Da Vinci” AI ecosystem. While direct use of facial recognition (Oosto) is unconfirmed, the use of voice biometrics/analytics is confirmed and operationally critical.
4. Core Intelligence Requirement 3: Innovation & Venture Capital
AXA Venture Partners (AVP) acts as the organization’s “forward operating base” in the technology war. With over $1 billion in assets under management, AVP scouts, funds, and integrates technologies that define the future of insurance. The audit reveals a strategic focus on the Israeli ecosystem.
4.1 The Capital Bridge: Funding the Defense-Tech Pipeline
AVP does not just buy software; it capitalizes the companies building it. This distinction is crucial for a “Digital Complicity” assessment. Buying a license provides revenue; providing Series A funding provides viability and scale.
4.1.1 Hub Security: The “Military-Grade” Investment
- The Investment: In May 2020, AVP led a $5 million Series A funding round for Hub Security.21 AVP was joined by OurCrowd, a Jerusalem-based crowdfunding platform deeply linked to the Israeli tech scene.
- The Target: Hub Security was founded by Eyal Moshe and other veterans of Unit 8200 and Unit 81 (the IDF’s secretive technology unit).
- The Technology: Hub Security develops Hardware Security Modules (HSMs) and confidential computing solutions. They explicitly market their products as “military-grade,” leveraging the founders’ experience in defense cyber warfare.
- Strategic Intent: AVP’s investment was explicitly strategic. Former AVP partners noted the goal was to help Hub Security expand globally and integrate into financial services.22 This represents AXA using its capital to commercialize IDF-derived technology for the civilian market.
4.1.2 Sayata Labs: Importing Cyber Risk Logic
- The Investment: AVP participated in the funding of Sayata Labs, a Tel Aviv-based insurtech, alongside Elron Electronic Industries.23 Elron is a major Israeli holding company with significant defense interests (formerly the parent of Elbit Systems).
- Integration: Guillaume Borie, CEO of AXA Next, stated, “With Sayata, we can both improve our risk selection, as well as advance our clients’ cybersecurity protection”.23
- Implication: This partnership integrates Israeli cyber-risk assessment algorithms directly into AXA’s underwriting process. AXA is effectively importing the Israeli cyber sector’s definition of “risk” into its global insurance policies.
4.2 AXA Lab Israel: Institutionalizing the Connection
AXA maintains AXA Lab Israel in Tel Aviv.24
- Mission: To identify the latest trends and connect with “new economy players.”
- Structure: This is not a remote interest; it is a physical presence designed to create a pipeline of Israeli technology into AXA’s global operations. It acts as a liaison office, facilitating the “Proof of Concept” (PoC) to “Global Rollout” journey for Israeli startups (like the Verint and Check Point deployments).
- Complicity Score Input: The existence of the Lab demonstrates that reliance on Israeli tech is not accidental but a deliberate corporate strategy.
4.3 Contrast Security and the Ecosystem Mesh
AVP also invested in Contrast Security ($30 million Series C).25 While Contrast is US-based, it has aggressively partnered with Wiz (Israeli) to integrate their platforms.26 This illustrates how AVP’s portfolio companies often form clusters that reinforce the broader “Silicon Wadi” ecosystem.
5. Core Intelligence Requirement 4: Cloud & Data Sovereignty
As AXA pursues “Project Future,” it is migrating its infrastructure to the cloud. This CIR examines the intersection of AXA’s cloud strategy and the State of Israel’s digital sovereignty initiatives, specifically Project Nimbus.
5.1 The Hyperscaler Dependency: Azure and AWS
AXA operates a “Cloud First” strategy, primarily leveraging Microsoft Azure and Amazon Web Services (AWS).
5.1.1 Microsoft Azure and “AXA Secure GPT”
- The Platform: AXA developed an internal generative AI platform named “AXA Secure GPT”.28 This tool allows 140,000 employees to use OpenAI’s models within a secure, private environment.
- The Infrastructure: The platform is built on Azure OpenAI Service.
- The Israel Connection:
- Microsoft Israel: Microsoft’s R&D center in Israel is one of its largest globally and is a primary hub for Azure security and AI development. The “Prompt Shields” and content safety features AXA relies on 29 likely contain IP developed in Herzliya.
- Data Centers: Microsoft launched its Israel Central cloud region to support the local market and government.30
- Project Nimbus Context: Microsoft, alongside Google, won the tender for Project Nimbus ($1.2 billion) to provide cloud services to the Israeli government and military.31
- Financial Complicity: By committing heavily to the Azure ecosystem, AXA contributes to the aggregate revenue of Microsoft. While AXA’s data may reside in European regions (e.g., France Central) for GDPR compliance, its cloud spend helps amortize the R&D costs of the Azure platform globally—a platform that is now the digital backbone of the IDF.
5.1.2 AWS and the Tel Aviv Region
- Migration: AXA Gulf has migrated the majority of its technology infrastructure to AWS.33
- Infrastructure: AWS launched the AWS Israel (Tel Aviv) Region.34
- Integration: AXA and AWS are jointly developing the AXA Digital Commercial Platform (DCP).35 This is a deep strategic partnership where AXA builds software on top of AWS to sell to other clients.
- Sovereignty Risk: The “shared fate” of cloud tenants means AXA relies on the same physical provider (AWS) that hosts the Israeli defense establishment (via Nimbus). While logically separated, they share the same supply chain.
5.2 Data Sovereignty and Legal Jurisdiction
The expansion of AWS and Azure into Israel introduces legal complexities regarding data access.
- Clarifying Lawful Overseas Use of Data Act (CLOUD Act): As US companies, Microsoft and AWS are subject to the CLOUD Act, which allows US law enforcement to request data stored overseas.
- Israeli Law: Data stored in the Israel regions (Tel Aviv/Central) is subject to Israeli law. While AXA likely keeps European customer data in Europe, any data processed through Israeli-developed SaaS platforms (like Wiz or Verint clouds) could theoretically traverse jurisdictions or be subject to access requests if the vendor is headquartered in Israel.
- Wiz Access: As noted in section 2.2.2, Wiz’s agentless scanning involves processing metadata about AXA’s cloud environment. If Wiz’s processing tenant is located in Israel (or if R&D teams in Israel access the data for support), AXA’s infrastructure map is exposed to that jurisdiction.
6. Core Intelligence Requirement 3 (cont.): Digital Transformation Integrators
Digital Transformation is not achieved in a vacuum; it requires “Integrators” to stitch these technologies together. The audit highlights Publicis Sapient as a key vehicle for this integration.
6.1 Publicis Sapient: The Architect
Publicis Sapient, the digital transformation hub of Publicis Groupe, acts as a strategic partner to AXA.36
- Role: Publicis Sapient helps AXA modernize legacy systems and implement “Speed” capabilities (Strategy, Product, Experience, Engineering, Data).
- The “AI Labs” Acquisition: Publicis Sapient acquired Publicis Sapient AI Labs (formerly a JV) to deepen its AI capabilities.37 This signals a move towards building proprietary AI models for clients.
- Global Partnership with Google Cloud: Publicis Sapient has a dedicated business unit for Google Cloud.38 Google is the other half of Project Nimbus. Publicis Sapient actively guides clients like AXA onto these platforms.
- Engineering Hubs: While Publicis Sapient has acquired engineering hubs in Romania (Tremend) 39 and Latin America (Practia) 40, its global delivery model relies on selecting “best-of-breed” vendors. In cybersecurity and analytics, this invariably leads them to recommend the “Unit 8200” stack (Check Point, Verint, CyberArk) to clients like AXA. The integrator acts as the “channel” through which these technologies enter the enterprise.
6.2 Internal Innovation: AXA Next and “The One AXA” Mindset
AXA’s internal innovation vehicle, AXA Next, is responsible for the “Build” and “Partner” strategies.
- B2B Focus: AXA Next focuses on B2B services.41 This aligns with the “Digital Commercial Platform” on AWS.
- Strategic Scouting: The existence of AXA Lab Israel confirms that AXA Next views Tel Aviv as a critical source of B2B innovation. The lab’s purpose is to find startups that can be scaled across the “One AXA” group. This creates a systemic suction mechanism, constantly pulling new Israeli tech into the group’s global operations.
7. Technographic Risk Assessment: Vectors of Complicity
This section synthesizes the data collected to inform the “Digital Complicity Ranking.” It categorizes the findings into four distinct risk vectors.
Vector 1: Direct Revenue Generation (The OpEx Pipe)
This vector measures the direct financial support provided to the Israeli economy through software licensing and subscription fees.
- High Impact: Check Point, Verint, CyberArk, Wiz.
- Analysis: AXA pays millions of dollars annually in recurring OpEx to these firms. Unlike one-off purchases, these are “forever contracts” required to keep the business running. This revenue supports the R&D budgets of companies that maintain close ties to the IDF (recruitment, reserve duty of staff, dual-use technology development).
Vector 2: Data Accessibility & Intelligence Exposure (The Surveillance Score)
This vector measures the exposure of AXA’s data to Israeli vendors.
- Critical Risk: Wiz (Full cloud topology visibility via agentless scanning).
- High Risk: Verint (Processing of customer voice/biometric data for AI training).
- Medium Risk: Check Point (Packet inspection at the perimeter).
- Analysis: Through these vendors, the “metadata” of AXA’s business (who calls, what servers exist, where vulnerabilities are) is accessible to platforms engineered in Tel Aviv.
Vector 3: Ecosystem Legitimation (The Venture Score)
This vector measures the extent to which AXA validates and capitalizes the Israeli tech ecosystem.
- High Impact: AXA Venture Partners (AVP).
- Specific Actions: Series A funding of Hub Security (Military-grade cyber), Seed funding of Sayata Labs.
- Analysis: By investing early, AXA provides the “stamp of approval” necessary for these startups to win further funding and global clients. AXA is an active participant in the success of the “Startup Nation” model.
Vector 4: Infrastructure Alignment (The Nimbus Score)
This vector measures reliance on infrastructure providers complicit in state projects.
- High Impact: Microsoft Azure, AWS.
- Analysis: AXA’s “Cloud First” strategy and joint development (e.g., AXA DCP on AWS, Secure GPT on Azure) align its roadmap with the winners of Project Nimbus.
- AXA’s Divestment from Israeli Banks – Profundo, accessed on January 29, 2026, https://profundo.nl/projects/axa-s-divestment-from-israeli-banks/
- axa: investments in israeli banks financing war crimes – Ekō, accessed on January 29, 2026, https://aks3.eko.org/images/AXA_investments_Israeli_banks_report_2024.pdf
- Report: AXA Investments in Israeli Banks Financing War Crimes – Ekō, accessed on January 29, 2026, https://actions.eko.org/a/axa-investments-in-israeli-banks-financing-war-crimes
- In huge victory, Palestine activists force AXA to divest from all Israeli banks and Elbit Systems, accessed on January 29, 2026, https://www.ipsc.ie/bds/axawin
- AXA DIVEST | BDS Movement, accessed on January 29, 2026, https://bdsmovement.net/axa-divest
- Divesting for Palestinian Rights – American Friends Service Committee, accessed on January 29, 2026, https://afsc.org/divest
- 2021 Annual Report – AXA Sigorta, accessed on January 29, 2026, https://www.axasigorta.com.tr/media/t1/001/660/898/256/AXA-Sigorta-&-Emeklilik-Faaliyet-Raporu-2021-ENG-10052022.pdf
- Cybersecurity risks to consider when the workforce returns – AXA XL, accessed on January 29, 2026, https://axaxl.com/fast-fast-forward/articles/cybersecurity-risks-to-consider-when-the-workforce-returns-to-work
- Check Point Software Technologies and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security, accessed on January 29, 2026, https://www.checkpoint.com/press-releases/check-point-software-technologies-and-wiz-enter-strategic-partnership-to-deliver-end-to-end-cloud-security/
- 2025 UK & Ireland CISO Community Executive Summit, accessed on January 29, 2026, https://www.evanta.com/ciso/uk/uk-ireland-ciso-executive-summit-7512
- CyberArk and Wiz Team Up To Provide Complete Visibility and Control for Cloud-Created Identities, accessed on January 29, 2026, https://www.cyberark.com/press/cyberark-and-wiz-team-up-to-provide-complete-visibility-and-control-for-cloud-created-identities/
- SentinelOne and Wiz Announce Exclusive Partnership to Deliver End to End Cloud Security, accessed on January 29, 2026, https://investors.sentinelone.com/press-releases/news-details/2023/SentinelOne-and-Wiz-Announce-Exclusive-Partnership-to-Deliver-End-to-End-Cloud-Security/default.aspx
- CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security, accessed on January 29, 2026, https://www.cyberark.com/press/cyberark-and-sentinelone-team-up-to-enable-step-change-in-endpoint-and-identity-security/
- Leading Insurance Company Accelerates And Secures Their Digital Transformation, accessed on January 29, 2026, https://www.cyberark.com/customer-stories/north-american-insurance-company/
- US Insurance Firm Bolsters Security And Compliance With CyberArk, accessed on January 29, 2026, https://www.cyberark.com/customer-stories/us-insurance-firm/
- Beyond the numbers: the human side of cyber threats – AXA.com, accessed on January 29, 2026, https://www.axa.com/stories/story-beyond-the-numbers-the-human-side-of-cyber-threats
- Anticipating the Future of Cyber-attacks: Tales from the Future and Real-Life Points of Caution | AXA, accessed on January 29, 2026, https://www.axa.com/en/insights/anticipating-the-future-of-cyber-attacks
- AXA Reduces Average Handle Time by 20%+ Using Modern … – Verint, accessed on January 29, 2026, https://www.verint.com/case-studies/axa-reduces-average-handle-time-by-20-using-modern-connected-verint-open-platform/
- Speech Analytics Software for Contact Centers – Verint, accessed on January 29, 2026, https://www.verint.com/speech-analytics/
- Gartner – Emerging Tech Impact Radar-Artificial Intelligence in Banking | PDF – Scribd, accessed on January 29, 2026, https://www.scribd.com/document/670762106/Gartner-Emerging-Tech-Impact-Radar-Artificial-Intelligence-in-Banking
- AXA Ventures Leads $5 Million Investment in Next-generation Cybersecurity Startup Hub Security – PR Newswire, accessed on January 29, 2026, https://www.prnewswire.com/il/news-releases/axa-ventures-leads-5-million-investment-in-next-generation-cybersecurity-startup-hub-security-301054886.html
- Companies – AVP, accessed on January 29, 2026, https://avpcap.com/companies/
- AXA-backed insurtech Sayata Labs launches with $6.5mn in funding – Reinsurance News, accessed on January 29, 2026, https://www.reinsurancene.ws/axa-backed-insurtech-sayata-labs-launches-with-6-5mn-in-funding/
- Bringing innovation to the next level – AXA.com, accessed on January 29, 2026, https://www.axa.com/en/news/bringing-innovation-to-the-next-level
- AXA Venture Partners – Lions Financial, accessed on January 29, 2026, https://lions.financial/axa-venture-partners/
- Contrast Security Joins the Wiz Integrations (WIN) Platform as a Launch Partner, accessed on January 29, 2026, https://www.contrastsecurity.com/press/contrast-security-joins-the-wiz-integrations-win-platform-as-a-launch-partner
- Contrast Security Joins the Wiz Integrations (WIN) Platform as a Launch Partner, accessed on January 29, 2026, https://www.prnewswire.com/news-releases/contrast-security-joins-the-wiz-integrations-win-platform-as-a-launch-partner-301848455.html
- AXA harnesses the power of secure generative AI with Azure OpenAI Service – Microsoft, accessed on January 29, 2026, https://www.microsoft.com/en/customers/story/1760377839901581759-axa-gie-azure-insurance-en-france
- Enhance AI security with Azure Prompt Shields and Azure AI Content Safety | Microsoft Azure Blog, accessed on January 29, 2026, https://azure.microsoft.com/en-us/blog/enhance-ai-security-with-azure-prompt-shields-and-azure-ai-content-safety/
- Microsoft Azure: Israel Central – Datacenters.com, accessed on January 29, 2026, https://www.datacenters.com/microsoft-azure-israel-central
- Don’t Buy into Occupation V report November 2025 – The Private Actors Behind the Economy of Occupation and Genocide – CNCD-11.11.11, accessed on January 29, 2026, https://www.cncd.be/IMG/pdf/2025-11-dbio-v-report.pdf
- Boycotts List | Ethical Consumer, accessed on January 29, 2026, https://www.ethicalconsumer.org/ethicalcampaigns/boycotts
- AXA shifts to AWS cloud in services push, accessed on January 29, 2026, https://www.zawya.com/en/business/axa-shifts-to-aws-cloud-in-services-push-urztor0r
- AWS Israel (Tel Aviv) Region, accessed on January 29, 2026, https://aws.amazon.com/local/israel/
- AXA and AWS Developing the First Global B2B Risk Management and Prevention Platform, accessed on January 29, 2026, https://www.axa.com/en/news/axa-and-aws-developping-first-global-b2b-risk-management-and-prevention-platform
- AXA Partners: Digital transformation by the business, for the business – Interface Magazine, accessed on January 29, 2026, https://interface.media/blog/executiveinsights/axa-partners-digital-transformation-by-the-business-for-the-business/
- Publicis Sapient acquires full stake in Publicis Sapient AI Labs, accessed on January 29, 2026, https://www.publicissapient.com/news/publicis-sapient-acquires-full-stake-in-publicis-sapient-ai-labs
- Publicis Sapient Announces Global Partnership With Google Cloud to Accelerate AI-Driven Digital Business Transformation, accessed on January 29, 2026, https://www.publicissapient.com/news/publicis-sapient-announces-global-partnership-with-google
- Top Automotive Web Design Companies 2025 | Goodfirms, accessed on January 29, 2026, https://www.goodfirms.co/top-web-design-companies/automotive?page=84
- Publicis Sapient Acquires Practia to Enter the Latin America Market and Expand Its Leading Global Distributed Delivery Model, accessed on January 29, 2026, https://www.publicissapient.com/news/ps-acquires-practia
- Innovation to better protect our customers | AXA, accessed on January 29, 2026, https://www.axa.com/en/about-us/innovation